A NOVEL APPROACH FOR DATA PUBLISHING IN MINING
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
In recent years, advances in technology have lead to an increase in the capability to store and record personal data about consumers and individuals. This has guide to concerns that the personal data may be misused for a variety of purposes. In order to improve this number of techniques has recently been proposed to perform the data mining tasks in a privacy preserving way. These techniques designed for performing privacy-preserving data mining are drawn from a wide array of related topics such as data mining. Here we present regular review for many forms of several anonymization techniques like generalization and bucketization, have been planned for private preserving micro data publishing. Our work has presented that generalization lose preferred amount of information for elevated-dimensional data. The tender, bucketization does not protect member ship confession. Where slicing is a method that preserves better data utility when compare to generalization and protects member ship disclosure better than bucketization. Here main focus on effective method that can be used s long as better data usage and it can maintain high-dimensional data.
Authors and Affiliations
Yedu kondalu, SK Mohiddin, M. Kiran Kumar
Security Approach Induction of Client Transferred Pictures on Content Sharing Website
Online Social networking’s gotten to be a standout amongst the most critical piece of our daily life as it empowers us to correspond with many people. Production of interpersonal interaction locales, for example, Mys...
Mobile Ad Hoc Networks Authentication Using NPV Method.
NPV (neighbour position verification) method is companionable with security architectures counting the ones that havebeen projected for vehicular networks whichsymbolize a likely deployment environment for NPV.Such a...
TPTD: Anonymization Of Large Scale Data Sets Using Map Reduce Jobs In Cloud
Cloud computing provides huge computation power and storage for users Forwarding their sensitive data for analysis or mining. Due to privacy issues Anonymizing datasets with kanonymity technique is used. But now a day...
Design and Implementation of GSM based Irrigation System Using ARM7
The developed system is a machine based system, which automates the irrigation of land by combining various software and hardware approaches together to find exact field information and to provide instant across the...
A survey – Energy Efficient Routing protocol for Homogenous & Heterogeneous Networks
The wireless sensor networks have gained a lot of grasp in the previous years due to various encroachments in this field. One of the major challenges faced by WSNs is the problem of energy efficiency. Various routing...